30 July 2017 - DEF CON 25 (2017)
Dan 'AltF4' Petro & Ben Morris - Bishop Fox
https://www.bishopfox.com
Weaponizing Machine Learning: Humanity Was Overrated Anyway
https://www.defcon.org/html/defcon-25/dc-25-speakers.html#Petro
At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.
DeepHack can ruin your day without any prior knowledge of apps, databases - or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you'll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we'll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own - unless time travelers from the future don't stop us first.

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.
EVENT:
Dutch PHP Conference in 2018
SPEAKER:
Adam Englander
PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
CREDITS:
Original video source: https://www.youtube.com/watch?v=KcjJ19geKmA

So we've talked a lot in this series about how computers fetch and display data, but how do they make decisions on this data? From spam filters and self-driving cars, to cutting edge medical diagnosis and real-time language translation, there has been an increasing need for our computers to learn from data and apply that knowledge to make predictions and decisions. This is the heart of machine learning which sits inside the more ambitious goal of artificial intelligence. We may be a long way from self-aware computers that think just like us, but with advancements in deep learning and artificial neural networks our computers are becoming more powerful than ever.
Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios
Want to know more about Carrie Anne?
https://about.me/carrieannephilbin
The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV
Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

How do computer hackers figure out our passwords? Learn about the techniques they use to crack the codes, and what systems protect us.
Building Digital Labyrinths To Hide Your Password - https://youtu.be/KFPkmhcSlo4
Sign Up For The Seeker Newsletter Here - http://bit.ly/1UO1PxI
Read More:
Here's How to Stop Russian Cyber-Hacking
http://www.seeker.com/heres-how-to-stop-russian-cyber-hacking-2149775375.html
“In October, malware embedded in residential internet routers and DVRs helped orchestrate a large-scale distributed denial of service (DDOS) attack on the East Coast that shut down Amazon, Netflix, Twitter and other major websites. The following month, a ransomware hack shut down San Francisco's public transit ticketing system for a few days after Thanksgiving.”
7 sneak attacks used by today's most devious hackers
http://www.infoworld.com/article/2610239/malware/7-sneak-attacks-used-by-today-s-most-devious-hackers.html
“Millions of pieces of malware and thousands of malicious hacker gangs roam today's online world preying on easy dupes. Reusing the same tactics that have worked for years, if not decades, they do nothing new or interesting in exploiting our laziness, lapses in judgment, or plain idiocy.”
How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter)
http://lifehacker.com/5919918/how-your-passwords-are-stored-on-the-internet-and-when-your-password-strength-doesnt-matter
“There are a number of ways a site can store your password, and some are considerably more secure than others. Here’s a quick rundown of the most popular methods, and what they mean for the security of your data.”
____________________
DNews is dedicated to satisfying your curiosity and to bringing you mind-bending stories & perspectives you won't find anywhere else! New videos daily.
Watch More DNews on Seeker http://www.seeker.com/show/dnews/
Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel
Seeker on Twitter http://twitter.com/seeker
Trace Dominguez on Twitter https://twitter.com/tracedominguez
DNews on Facebook https://facebook.com/DiscoveryNews
DNews on Google+ https://plus.google.com/u/0/+dnews
Seeker http://www.seeker.com/
Sign Up For The Seeker Newsletter Here: http://bit.ly/1UO1PxI

'Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords...
Please note,at one point during the video Mike suggests using SHA512. Please check whatever the recommended process is at the time you view the video.
Here's a look at 'Beast': https://www.youtube.com/watch?v=RG2Z7Xgthb4
How NOT to Store Passwords: https://youtu.be/8ZtInClXe1Q
Password Choice: https://youtu.be/3NjQ9b3pgIg
Deep Learning: https://youtu.be/l42lr8AlrHk
Cookie Stealing: https://youtu.be/T1QEs3mdJoc
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4
Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios
Want to know more about Carrie Anne?
https://about.me/carrieannephilbin
The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV
Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Speaker: Pengtao Xie
Title: Privacy Preserving Neural Network Prediction on Encrypted Data
Abstract: Recently, many cloud based machine learning (ML) services have been launched, including Microsoft Azure Machine Learning, GraphLab, Google Prediction API and Ersatz Labs. Cloud ML makes machine learning very easy to use for common users. However, it invades the privacy and security of users' data. How to protect users' privacy in cloud ML is a big challenge. In this work, we focus on neural network which is a backbone model in machine learning, and investigated how to perform privacy-preserving neural network prediction on encrypted data. Users encrypt their data before uploading them to the cloud. Cloud performs neural network predictions over the encrypted data and obtains the results which are also in encrypted form that the cloud cannot decipher. The encrypted results are sent back to users and users do the decryption to get the plaintext results. In this process, cloud never knows users' input data and output results since they are both encrypted. This achieves a strong protection of users' privacy. Meanwhile, with the help of homomorphic encryption, predictions made on encrypted data are nearly the same as those on plaintext data. The predictive performance of neural network is guaranteed.
For more ML lunch talks, visit http://www.cs.cmu.edu/~learning/

A solid state quantum processor using qubits, is this the most powerful computer capable of actually breaking RSA Encryption? Taken from Defeating The Hackers.
Subscribe to the BBC Studios channel: http://www.youtube.com/subscription_center?add_user=BBCWorldwide
BBC Studios Channel: http://www.youtube.com/BBCStudios
This is a channel from BBC Studios who help fund new BBC programmes.

Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers—sometimes just amusement or curiosity, sometimes for money, and sometimes to promote social or political goals. Regardless, we're not going to teach you how to become a hacker in this episode but we are going to walk you through some of the strategies hackers use to gain access to your devices, so you can be better prepared to keep your data safe.
*CORRECTION*
AT 7:40 "whatever" should not have a leading '
The correct username field should be:
whatever’; DROP TABLE users;
Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios
Want to know more about Carrie Anne?
https://about.me/carrieannephilbin
The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV
Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

Ian Goodfellow, Staff Research Scientist, Google Brain
Machine learning is a powerful new tool that can be used for security applications (for example, to detect malware) but machine learning itself introduces many new attack surfaces. For example, attackers can control the output of machine learning models by manipulating their inputs or training data. In this session, I give an overview of the emerging field of machine learning security and privacy.
Learning Objectives:
1: Learn about vulnerabilities of machine learning.
2: Explore existing defense techniques (differential privacy).
3: Understand opportunities to join research effort to make new defenses.
https://www.rsaconference.com/videos/security-and-privacy-of-machine-learning

As quantum computing matures, it's going to bring unimaginable increases in computational power along with it -- and the systems we use to protect our data (and our democratic processes) will become even more vulnerable. But there's still time to plan against the impending data apocalypse, says encryption expert Vikram Sharma. Learn more about how he's fighting quantum with quantum: designing security devices and programs that use the power of quantum physics to defend against the most sophisticated attacks.
Check out more TED Talks: http://www.ted.com
The TED Talks channel features the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design -- plus science, business, global issues, the arts and more.
Follow TED on Twitter: http://www.twitter.com/TEDTalks
Like TED on Facebook: https://www.facebook.com/TED
Subscribe to our channel: https://www.youtube.com/TED

Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us how they work.
Cookie Stealing: https://youtu.be/T1QEs3mdJoc
Rob Miles on Game Playing AI: https://youtu.be/5oXyibEgJr0
Secure Web Browsing: https://www.youtube.com/watch?v=E_wX40fQwEA
Deep Learning: https://youtu.be/l42lr8AlrHk
Tom Scott on SQL Injection: https://youtu.be/_jKylhJtPmI
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Sentdex.com
Facebook.com/sentdex
Twitter.com/sentdex
How to use python to encrypt sensitive information, and later decrypt it, using PyCrypto!
PyCrypto: https://www.dlitz.net/software/pycrypto/
The Code: http://sentdex.com/sentiment-analysisbig-data-and-python-tutorials/encryption-and-decryption-in-python-code-example-with-explanation/

Abstract:
In this talk, I will talk about challenges and exciting new opportunities at the intersection of AI and Security, how AI and deep learning can enable better security, and how Security can enable better AI. In particular, I will talk about secure deep learning and challenges and approaches to ensure the integrity of decisions made by deep learning. I will also give an overview on challenges and new techniques to enable privacy-preserving machine learning. I will also talk about our recent project on confidentiality-preserving smart contracts and towards democratization of AI. Finally, I will conclude with future directions at the intersection of AI and Security.
Presented by Dawn Song (EECS at UC Berkeley)

Deep learning is used for everything these days, but this face detection algorithm is so neat its still in use today. Dr Mike Pound on the Viola/Jones algorithm.
Viola/Jones Paper: http://bit.ly/C_RapidObjectDetectPaper
After detection you may want to ID the face: https://youtu.be/mwTaISbA87A
Hardware Hacking: https://youtu.be/eOPLQxGNmHA
EXTRA BITS: https://youtu.be/s2ciAt7KtZc
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

In this video I describe 7 of the current dangers for our Crypto funds. Hackers are trying to get our crypto with all kinds of things, like malware, trojan horses, phishing, scamming..
It is ugly out there online and make sure you take proper security measures as is explained in this video.
Hope you like it, is so please leave a like and subscribe for regular Crypto Videos!
Lend out Bitcoin and earn interest daily:
https://bitconnect.co/?ref=misterholland
Start mining Bitcoin through Cloudmining:
Genesis-mining.com with discount code: lsICQO
Buy Bitcoin and Altcoins easily:
https://www.litebit.eu?referrer=20293
Keep your Bitcoins safe on a hardware wallet:
https://trezor.io/?a=nzm43gx7ztry

Cell Phone Hacking and Repair Simulator - Electrix Electro Mechanic Simulator Demo
Subscribe if you like! + http://bit.ly/1PG8z9G
Watch More Strange Simulator Games Here! + https://youtube.com/watch?v=n4CisUucR68&list=PLw8xXEJ0p21dZZE5yZ8wbks2F674kl5iH
Welcome to a game that's a cross between Car Mechanic Simulator, PC Builder Simulator, and some Hacking Simulator.
Follow me on Twitter! + https://twitter.com/GrayStillPlays
Like me on Facebook! + https://www.facebook.com/graystillplays/
Electrix on Kickstarter! + https://www.kickstarter.com/projects/1682878583/electrix-electro-mechanic-simulator
Electrix on Steam! + https://store.steampowered.com/app/652620/ElectriX_Electro_Mechanic_Simulator/
----------------------------------
Watch More From GrayStillPlays:
The Best VR Games: https://www.youtube.com/watch?v=5aHtqaUilsU&list=PLw8xXEJ0p21fqRS8Og9EgEQPlIMtCDCFw
The Strangest Random Games: https://www.youtube.com/watch?v=5aHtqaUilsU&list=PLw8xXEJ0p21dZZE5yZ8wbks2F674kl5iH
The Long Dark Story Mode: https://www.youtube.com/playlist?list=PLw8xXEJ0p21cRpG2ekPnXgCBd5mwB2bFu
Ravenfield: https://www.youtube.com/watch?v=6Qm-oPk13F0&list=PLw8xXEJ0p21f33Ch39OBlmbON7HRIXqzu
Total Tank Simulator: https://www.youtube.com/watch?v=qrb7ktzaRTc&list=PLw8xXEJ0p21ff_ky6fggbPQo_hlsuxczq
My Summer Car: https://www.youtube.com/watch?v=75N96As-2Kg&list=PLw8xXEJ0p21fSpKwt_HOlpsLVSnykDpa2
My Little Blacksmith Shop: https://www.youtube.com/watch?v=-GQEOwtOQCM&list=PLw8xXEJ0p21e93cljO92di6wdJapOJ8DV
BeamNG Drive: https://www.youtube.com/watch?v=jA9NIiTgcV4&list=PLw8xXEJ0p21cYOq_6dHYfRsBukbTlOAzy
Brick Rigs: https://www.youtube.com/watch?v=MMjJLWWtpTg&list=PLw8xXEJ0p21eouNgeRox6tSwWvc1utwF7
Raft: https://www.youtube.com/watch?v=_Ku9IyFNB-s&list=PLw8xXEJ0p21fIDAAlug4WKQQyRnPZWWT6
Ultimate Epic Battle Simulator: https://www.youtube.com/watch?v=6I_3dq60d_A&list=PLw8xXEJ0p21dHe6ValEsWiRogVVtqXMg3
----------------------------------
ABOUT: Electrix: Electro Mechanic Simulator
- Over 40 unique devices with skin permutations which give player over 100 different devices to fix
- Zoom in and admire every part from up close
- You can't just simply click your way through the task, you have to be careful not to brake something
- Inspect parts to see their condition - after inspection if costs are bigger than client expects, you can cancel order or ask for bigger budget
- Solder broken parts - project and build your own stuff. It's up to you, if it's gonna work
- Buy old devices and repair them just to sell them for a better price
- Buy broken electronics and scrap them for parts to use it later
- Modern and retro electronic equipment
- Hacking and intelligence special devices
- Special courses to achieve new skills necessary in career advance
- To get energy to work you can make and drink coffee
- You can test and play games on fixed consoles
- You can watch secret movies on fixed mobiles
- You can buy CryptoMiner, upgrade it with better GPUs, install and dig Crypto Currency to use it on Hacking services and devices
- Many different tasks to complete. Some are easy but sometimes there is a client that knows nothing and just tells you that the phone sounds weird
- But the most important avoid troubles...
- And get rewards...
- And always look for clues to solve the mystery...
----------------------------------
End Card By Exandria: https://www.youtube.com/user/sora12428719/
Hello everybody, I'm Gray! I love doing let's plays and tutorials of games, such as Happy Room, Conan Exiles, Raft, My Summer Car, Hello Neighbor, Brick Rigs, Totally Accurate Battle Simulator, and BeamNG.Drive. I've got at least two new videos coming out every day focusing on gameplay, tutorials, tips and tricks, and bonus videos coming out of the newest Indie games as well. Thanks for checking me out!
#graystillplays #policechase #simulation

In this panel discussion at the Webit.Festival, one of the largest technology events in Europe, Dr. Ben Goertzel (CEO & Co-Founder SingularityNET), Jesus Mantas (Managing Partner & GM IBM Business Consulting), and author Leah Hunter discuss the possible beneficial and harmful consequences of AI - and what steps can be taken to ensure that the technology is benevolent for all.
To learn more about SingularityNET, please visit: https://blog.singularitynet.io/
----
SingularityNET is a decentralized marketplace for artificial intelligence. We aim to create the world's global brain with a full-stack AI solution powered by a decentralized protocol.
We gathered the leading minds in machine learning and blockchain to democratize access to AI technology. Now anyone can take advantage of a global network of AI algorithms, services, and agents.
Website: https://singularitynet.io
Forum: https://community.singularitynet.io
Telegram: https://t.me/singularitynet
Twitter: https://twitter.com/singularity_net
Facebook: https://facebook.com/singularitynet.io
Instagram: https://instagram.com/singularitynet.io
Github: https://github.com/singnet
Linkedin: https://www.linkedin.com/company/singularitynet

We rely on Chip & PIN machines to pay for things in a safe way, so how are they being compromised? Ross Anderson is Professor of Security Engineering at the Computer Laboratory, University of Cambridge.
Man in the Middle Attacks: https://youtu.be/-enHfpHMBo4
AI Worst Case Scenario - Deadly Truth of AI: https://youtu.be/tcdVC4e6EV4
The Problem with JPEG: https://youtu.be/yBX8GFqt6GA
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hosted by: Michael Aranda
----------
Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.
----------
Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow
Or help support us by becoming our patron on Patreon:
https://www.patreon.com/scishow
----------
Looking for SciShow elsewhere on the internet?
Facebook: http://www.facebook.com/scishow
Twitter: http://www.twitter.com/scishow
Tumblr: http://scishow.tumblr.com
Instagram: http://instagram.com/thescishow
Sources:
http://www.vectorsite.net/ttcode_04.html#m3
http://www.simonsingh.net/The_Black_Chamber/crackingprinciple.html
http://book.itep.ru/depository/crypto/Cryptography_history.pdf
http://www.cs.trincoll.edu/~crypto/historical/gronsfeld.html
http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730
http://ftp.stmarys-ca.edu/jsauerbe/m10s11/chapter5.pdf
http://www.turing.org.uk/scrapbook/ww2.html
http://enigma.louisedade.co.uk/howitworks.html
http://www.codesandciphers.org.uk/enigma/example1.htm
http://www.pbs.org/wgbh/nova/military/how-enigma-works.html
http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html

The Google Brain team, a wing of Google working on developing neural network and artificial intelligence technologies, are experimenting with having their neural networks, named Alice, Bob and Eve, develop encryption. The task the Google Brain team set was for Alice to create a simple form of encryption and work with Bob to agree a set of numbers known as a key. Using this key, Bob can read the encrypted messages Alice sent. Meanwhile Eve intercepts the messages and attempts to decipher them. The important thing to remember about neural nets is they continue to learn and adapt, just like us humans do. So while initially the secret message passing didn’t go so well, Alice adapted and got better. Eve was unable to decipher the messages beyond what classes as pure chance. This technology could put digital security in the hands of AI in the future, completely foiling the efforts of hackers to decrypt.
http://www.geek.com/tech/googles-alice-ai-is-sending-secret-messages-to-another-ai-1677220/?source
http://www.wochit.com
This video was produced by YT Wochit Tech using http://wochit.com

Backdoors, Government Hacking and The Next Crypto Wars
Speaker: Christopher Soghoian - Principal Technologist, Privacy & Technology Project, ACLU
The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What can the FBI and other agencies do to preserve their spying capabilities?
Part of the answer is backdoors: The FBI is rallying political support in Washington, DC for legislation that will give it the ability to fine Internet companies unwilling to build surveillance backdoors into their products. Even though interception systems prove to be irresistible targets for nation states, the FBI and its allies want to make our networks less secure, not more.
The other solution embraced by the FBI is hacking, by the government, against its citizens. A team of FBI agents and contractors, based in Quantico, Virginia have developed (and acquired) the capabilities to hack into systems, deliver malware capable of surreptitiously enabling a computer's webcam, collecting real-time location data, as well as exfiltrating emails, web browsing records and other documents.
While politicians are clearly scared about hacks from China, our own law enforcement agencies are clearly in the hacking business. What does this mean for the current, heated debate about cybersecurity and our ability to communicate security?
Christopher Soghoian (@csoghoian) s a privacy researcher and activist, working at the intersection of technology, law and policy. He is the Principal Technologist with the Speech, Privacy and Technology Project at the American Civil Liberties Union.
Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice and used several other investigative research methods. His research has appeared in publications including the Berkeley Technology Law Journal and been cited by several federal courts, including the 9th Circuit Court of Appeals.
Between 2009 and 2010, he was the first ever in-house technologist at the Federal Trade Commission (FTC)'s Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix.

Breakdown of the recent Whatsapp buffer overflow vulnerability (CVE-2019-3568) that allowed for a remote code execution and was exploited in the wild to install Pegasus, the famous spyware made by the NSO Group.
Facebook - https://www.facebook.com/zSecurty
Website - https://zsecurity.org/
My full course on social engineering (with a discount code):
https://zsecurity.org/courses/learn-social-engineering-from-scratch/?coupon=youtube-se